upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. işlem belirli bir türü için belirli bir nesneye erişmek için bir konu için izni. Not: Yazma değil ama bir dosyayı okumak için bir işlem için izin bir erişim değil bir örnektir. 2. yetki erişim. Notlar:-Ebilmek var olmak daha fazla veya daha az açık, hem de konular ve güvenlik ilkesi uygulama ve farklı türlerde erişim yetkisi kullanılan nesneleri tanım taneciklik erişim hakları (örneğin okuma, yazma, yürütmek,) değil izin verilir olarak içinde belirli içerik (örneğin içinde elektronik bir güvenlik ortamında veya veritabanı) erişim hakları yok. Ayrıca bkz: bilmesi gerek, en az ayrıcalık.
Industry:Telecommunications
1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. 2. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to wide area telephone service (WATS) lines. Note: For remote access, individual authorization codes are usually required.
Industry:Telecommunications
1. Pertaining to the relationship of two or more repetitive signals that have simultaneous occurrences of significant instants. Note: "Isochronous" and "anisochronous" pertain to characteristics. "Synchronous" and "asynchronous" pertain to relationships. 2. Pertaining to synchronism.
Industry:Telecommunications
1. Pertaining to, or characteristic of, a computer program consisting of (a) many relatively small, simple programs (subroutines,) and (b) one monitor program, the function of which is to coordinate the exchange of data among the subroutines. Note: Subroutines designed under this concept may be stored in object libraries, and used by other computer programmers with similar functional requirements. 2. Pertaining to, or characteristic of, data to be processed by object-oriented programs. Note 1: Each data object in an object-oriented program may have multiple attributes associated with it. For example, if a data object were defined as a person, several appropriate attributes might be the person's birth date, social security number, and eye color. Note 2: The data and its attributes are considered as one object as they pass between subroutines. Note 3: Objects with similar attributes are considered as a particular class of objects. For example, "people" would be one class of objects and "automobiles" could be another, because the objects in the "automobiles" class are likely to have a completely different set of attributes associated with them.
Industry:Telecommunications
1. fiziksel donanım programları, yordamlar, kurallar ve ilgili belgeler aksine. 2. genel bir terim farklı olarak onun yetenek veya işlev gibi ekipmanları, araçlar, uygular, aletler, cihazlar, fiziksel öğeleri ile ilgili ayarlar, bağlantı parçaları, abartı, derlemeler, yarı mamuller, bileşenler ve parçalar. Terim genellikle açısından olduğu gibi bir aygıtı veya bileşeni bir geçit donanım sahne bitmiş nesne olarak içine tasarım aşamasından geliştirme aşamasında kullanılır. 3 veri Otomasyonu, fiziksel donanım veya aygıt. bilgisayar ve çevre birimi bileşenleri oluşturan. 4. fiziksel donanım belgelerine ilgili ve veri işleme programları, yordamlar, kurallara karşı kullanılır.
Industry:Telecommunications
1. Reassignment and re-use of a storage medium containing one or more objects after ensuring no residual data remains on the storage medium. 2. Reuse of a storage medium for a different object. Note: A vulnerability may exist if the medium contains residual data from a previous object. This is now the accepted term, despite the fact that it is the storage medium, not the object, that is reused. See also: Purge. 3. The reassignment to some subject of a medium (e. G. , page frame, disk sector, magnetic tape) that contained one or more objects. To be securely reassigned, such media must contain no residual data from the previously contained object (s. )
Industry:Telecommunications
1. Representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. Any representations such as characters or analog quantities to which meaning is or might be assigned. 2. Representations of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by human and/or automatic means. Note: The interpretation of data as information requires a convention (e. G. Language. ) 3. Information with a specific physical representation.
Industry:Telecommunications
1. Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. 2. A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator. 3. Evidence by proper signature or seal that a document is genuine and official. 4. The verification of a claimed identity. Example: By the use of a password. 5. The process by which the identity of an entity is established. 6. See data origin authentication, and peer entity authentication. Note: In this part of 7498 the term "authentication" is not used in connection with data integrity; the term "data integrity" is used instead. The property of knowing that the data received is the same as the data that was sent, and that the claimed sender is in fact the actual sender.
Industry:Telecommunications
1. güvenlik test değerlendiriciler sistemi tasarımı ve uygulaması kendi anlayış dayalı bir sistem güvenlik özelliklerini aşmak girişiminde. 2. bilinen güvenlik açıkları aslında uygulamada kullanılabilir olup olmadığını onaylamak için değerlendirmeye hedef bir değerlendirici tarafından yapılan testler. 3. modeli bir sistem güvenlik özellikleri aşmak girişiminde güvenlik test bölümü. Explosively listeleme sistemi kaynak kodu, kılavuzları ve devre şemaları içerebilir tüm sistem tasarım ve gerçekleştirme belgeleri, kullanmak için kabul edilebilir. Explosively dışındaki sıradan kullanıcılara uygulanacak kısıtlamalar altında çalışır.
Industry:Telecommunications
1. See aliasing. 2. In networking, one of a set of domain names of an Internet resource. 3. Synonyms personal number, UPT number.
Industry:Telecommunications